Page 151 / 198 Scroll up to view Page 146 - 150
Chapter 18 Wireless Configuration
802.1X uses an existing protocol, the Extensible Authentication
Protocol (EAP, RFC 2284), that works on Ethernet, Token Ring, or
wireless LANs, for message exchange during the authentication
process.
In a wireless LAN with 802.1X, a user (known as the supplicant)
requests access to an access point (known as the authenticator).
The access point forces the user (actually, the client software of
the user) into an unauthorized state that allows the client to send
only an EAP start message. The access point returns an EAP mes-
sage requesting the identity of the user.
The client returns the
identity, which is then forwarded by the access point to the au-
thentication server, which uses an algorithm to authenticate the
user and then returns an accept or reject message back to the
access point. Assuming an accept was received, the access point
changes the client’s state to authorized and normal transmission
can take place.
The authentication server may use the Remote Authentication
Dial-In User Service (RADIUS), although 802.1x does not specify
it.
WPS
Wi-Fi Protected Setup (WPS), was introduced and developed by
the Wi-Fi Alliance (http://www.wi-fi.org/) to help standardize and
simplify ways of setting up and configuring security on a wireless
network.
Traditionally, users would have to manually create a wireless net-
work name (SSID), and manually enter a creative, yet predictable
security key on both the access point and the client, to prevent
unwanted access to their wireless network.
This entire process
requires the users to have the background knowledge of the
Wi-Fi devices and the ability to make the necessary configuration
changes.
WPS was introduced to relieve and remove all of the guess work of
securing a wireless network by typing a short PIN (numeric code)
or pushing a button (Push-Button Configuration, or PBC). On a new
wireless network, WPS automatically configures a wireless network
with a network name (SSID) and strong WPA data encryption and
authentication. WPS is designed to support various Wi-Fi certified
802.11 products ranging from access points, wireless adapters,
Wi-Fi phones, and other consumer electronics devices.
Advantages of WPS:
WPS automatically configures the network name (SSID) and
WPA security key for the access point and the WPS enabled
client devices on a network.
You do not need to know the
SSID and security keys or passphrases when connecting WPS-
enabled devices.
No one can guess or figure out your security keys or passphrase
because the keys are randomly generated. You need not enter
predictable passphrases or long sequences of hexadecimals.
Information and network credentials are securely exchanged
over the air using the EAP, one of the authentication protocols
used in WPA2.
WPS has been integrated and supported in Windows Vista.
Currently, Windows Vista only works in Registrar mode.
Disadvantages of WPS:
Confidential and Proprietary Information of ZTE CORPORATION
145
Page 152 / 198
ZXDSL 931WII Operation manual
It does not support Ad-Hoc mode or network where wireless
devices communicate directly with each other without an ac-
cess point. All Wi-Fi devices in the network must be WPS certi-
fied or WPS-compatible, otherwise you cannot take advantage
of the ease of securing the network.
Difficult to add a non-WPS client device to the network because
of the long sequences of hexadecimal characters generated by
the WPS technology. As this technology is fairly new, not every
vendor supports the WPS technology.
Wireless Client requirements
Radio Transmis-
sion
WLAN
devices use electromagnetic waves within a broad, unli-
censed range of the radio spectrum to transmit and receive ra-
dio signals. When a wireless access point is present, it becomes
a base station for the WLAN nodes in its broadcast range. WLAN
nodes transmit digital data using frequency modulation (FM) radio
signals. WLAN devices generate a carrier wave and modulate this
signal using various techniques. Digital data is superimposed onto
the carrier signal. This radio signal carries data to WLAN devices
within range of the transmitting device.
The antennae of WLAN devices listen for and receive the signal.
The signal is demodulated and the transmitted data is extracted.
The transmission method used by the access point is called Di-
rect Sequence Spread Spectrum (DSSS) and DSSS is operated in
a range of the radio spectrum between 2.4 GHz and 2.5 GHz for
transmission. See the expert technical specifications for more de-
tails on wireless operation.
Antenna
Direct the external antenna to allow optimization of the wireless
link.
If for example the antenna is erect, wireless links in the
horizontal plane are favored.
Note that the antenna characteristics are influenced by the envi-
ronment, that is, by reflections of the radio signal against walls
or ceilings. It is advisable to use the received signal strength as
indicated by the wireless client manager to optimize the antenna
position for the link to a given client. Concrete walls weaken the
radio signal and thus affect the connection.
Range
Range should not be a problem in most homes or small offices. If
you experience low or no signal strength in some areas, consider
positioning the 931WII in a location between the WLAN devices
that maintains a roughly equal straight-line distance to all devices
that need to access the 931WII through the wireless interface.
Adding more 802.11g access points to rooms where the signal is
weak can improve signal strength.
Radio Channel
The 802.11g standard allows several WLAN networks using differ-
ent radio channels to be co-located.
The Guw5.5Z66-5 supports
multiple radio channels and is able to select the best radio channel
at each startup. You can choose to set the channels automatically
or manually. Different channels overlap. To avoid interference with
another access point, make sure that the separation (in terms of
frequency) is as high as possible.
It is recommended to keep at
least 3 channels between 2 different access points.
146
Confidential and Proprietary Information of ZTE CORPORATION
Page 153 / 198
Chapter 18 Wireless Configuration
The Guw5.5Z66-5 supports all channels allowed for wireless net-
working. However, depending on local regulations, the number of
channels actually allowed to be used may be restricted, as shown
in
T
a
b
l
e
2
9
.
T
ABLE
29 R
ADIO
C
HANNEL
R
ESTRICTION
Regulatory Domain
Allowed Radio Channels
China
1 to 13
Europe
1 to 13
Israel
5 to 8
Japan
1 to 14
Jordan
10 to 13
Thailand
1 to 14
USA / Canada
1 to 11
Wireless Distribution System
The
WLAN
series of APs use wireless ports to interconnect BSS
areas.
WDS is commonly used in areas requiring multiple APs, where
wiring is not possible or costly, and is used for providing backup
paths between APs.
The number of ports on an AP available for the WDS depends on
the AP model. The 520wl for example, allows up to six WDS links.
The same frequency channels must be used on each end of a WDS
link.
The same PC card that supports a BSS area can be used for a
WDS link.
The packet flow through the WDS is very similar to
the standard DS except it uses the wireless ports instead of the
Ethernet port.
Configure Wireless
Connection
Wireless - Basic
Select
Wireless > Basic
to display the interface as shown in
F
i
g
-
u
r
e
1
6
2
.
Confidential and Proprietary Information of ZTE CORPORATION
147
Page 154 / 198
ZXDSL 931WII Operation manual
F
IGURE
162 W
IRELESS
- B
ASIC
This page allows you to configure basic features of the
WLAN
in-
terface.
You can enable or disable the WLAN interface, hide the
network from active scans, set the wireless network name (also
known as SSID) and restrict the channel set based on country re-
quirements.
T
a
b
l
e
3
0
is the description of the different options.
T
ABLE
30 W
IRELESS
B
ASIC
C
ONFIGURATION
O
PTIONS
Field
Description
Enable Wireless
Select
this
check
box
to
enable
wireless.
If this check box is not
selected,
the
Hide
Access
Point,
Clients
Isolation,
Disable
WMM
Advertise,
SSID,
BSSID,
Coun-
try/Region,
Max
Clients,
Wire-
less – Guest/Virtual Access Points
boxes are not displayed.
Hide Access Point
Select this check box if you want
to hide any access point for your
router, so a station cannot obtain
the
SSID
through
passive
scan-
ning.
148
Confidential and Proprietary Information of ZTE CORPORATION
Page 155 / 198
Chapter 18 Wireless Configuration
Field
Description
Clients Isolation
When many clients connect to the
same access point, they can ac-
cess each other.
If you want to
disable the access between clients
which
connect
the
same
access
point,
you can select this check
box.
Disable WMM Advertise
Wi-Fi multimedia (WMM) can pro-
vide high-performance multimedia
voice and video data transfers.
SSID
The
SSID
is
the
network
name
shared among all points in a wire-
less network.
The SSID must be
identical for all points in the wire-
less network.
It is case-sensitive
and must not exceed 32 characters
(use any of the characters on the
keyboard). Make sure this setting
is the same for all points in your
wireless network.
For added se-
curity, you should change the de-
fault SSID to a unique name.
Country/Region
The
name
of
the
country
with
which your gateway is configured.
This
parameter
further
specifies
your
wireless
connection.
For
example, the channel adjusts ac-
cording
to
the
region
to
adapt
to the frequency provision of the
specific region.
Max Clients
Specifies
the
maximum
number
of wireless client stations that can
be connected to the AP. Once the
clients exceed the max vlaue, all
other
clients
are
refused.
The
value
range
is
between
six
and
ten.
Wireless
-
Guest/Virtual
Access
Points
If you want to make Guest/Virtual
network
function
available,
you
must select those check boxes in
the table below.
In the current
software version, three virtual ac-
cess points can be configured.
Click
Save/Apply
to save the basic wireless options so that the
changes can take effect.
Wireless–Security
This device is equipped with 802.1X and WPA/WPA2 (Wi-Fi Pro-
tected Access), the latest security standard. It also supports the
legacy security standard WEP.
Confidential and Proprietary Information of ZTE CORPORATION
149

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top